Author of the publication

A New Scheme for Indirect Trust Calculation to Resist Bigmouth Attack in Wireless Ad Hoc Network.

, , , , , , , and . CSE, page 248-251. IEEE Computer Society, (2013)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A Novel Genome-Information Content-Based Statistic for Genome-Wide Association Analysis Designed for Next-Generation Sequencing Data., , and . J. Comput. Biol., 19 (6): 731-744 (2012)A different approach to teaching Chinese through serious games., , , , and . FDG, page 304-306. ACM, (2011)Game Theoretic Approach for Network Access Control in Heterogeneous Networks., , , and . IEEE Trans. Vehicular Technology, 67 (10): 9856-9866 (2018)A Detailed Reliability Study of the Motor System in Pure Electric Vans by the Approach of Fault Tree Analysis., , , , , and . IEEE Access, (2020)A Transfer Learning Approach for Predictive Modeling of Degenerate Biological Systems., , , , , and . Technometrics, 57 (3): 362-373 (2015)Chaotic Coyote Optimization Algorithm., , , , and . J. Ambient Intell. Humaniz. Comput., 13 (5): 2807-2827 (2022)Federated Domain Adaptation via Transformer for Multi-Site Alzheimer's Disease Diagnosis., , , , , , , , , and 4 other author(s). IEEE Trans. Medical Imaging, 42 (12): 3651-3664 (December 2023)A general parsing algorithm with context matching for context-sensitive graph grammars., , and . Multim. Tools Appl., 81 (1): 273-297 (2022)STAR: an integrated solution to management and visualization of sequencing data., , , , , , , , , and 2 other author(s). Bioinform., 29 (24): 3204-3210 (2013)A Dynamical Shape Prior for LV Segmentation from RT3D Echocardiography., , , and . MICCAI (1), volume 5761 of Lecture Notes in Computer Science, page 206-213. Springer, (2009)